Search Results - (( pattern solution mining algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…Frequent pattern mining is one of the active research themes in data mining. …”
    Get full text
    Get full text
    Article
  2. 2

    Using unique-prime-factorization theorem to mine frequent patterns without generating tree by Tohidi, Hossein, Ibrahim, Hamidah

    Published 2011
    “…For huge database it may need to generate a huge number of candidate sets. An interest solution is to design an approach that without generating candidate is able to mine frequent patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    A partition based feature selection approach for mixed data clustering / Ashish Dutt by Ashish , Dutt

    Published 2020
    “…One such pre-processing algorithm in EDM is clustering. It is a widely used method in data mining to discover unique patterns in underlying data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…Many intensive researches have been conducted to enhance the capability of data mining solution in providing the intelligence so that different types of businesses can make informed decisions. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Secondly, the CTI dataset, which has been proven by the existing research work as a more suitable Web server logs in the term of Web page recommendation quality, is used for measuring the performance of the proposed modified algorithm for Web page recommendation system. The experiment is divided into three interdependent stages of usage mining process, namely: data preparation, pattern discovery, and recommendation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11
  12. 12

    Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak by Ishak, Rusmawati

    Published 2018
    “…Orange is a tool that being used in implementing K-Means Clustering Algorithm that could be seen as the most suitable solution to find a network trend pattern of user accessing the Internet and to produce with profiling network. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimizing OLAP heterogeneous computing based on Rabin-Karp algorithm by Alzeini, Haytham I M, Hameed, Shihab A., Habaebi, Mohamed Hadi

    Published 2013
    “…Keywords— OLAP, heterogeneous computing, Rabin-Karp, data mining, pattern recognition.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    An improved ACS algorithm for data clustering by Mohammed Jabbar, Ayad, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2020
    “…Data clustering is a data mining technique that discovers hidden patterns by creating groups (clusters) of objects. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…In dendrite cell algorithm (DCA), the abnormality of a data point is determined by comparing the multi-context antigen value (MCAV) with anomaly threshold. …”
    Get full text
    Get full text
    Article
  17. 17

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An improved artificial dendrite cell algorithm for abnormal signal detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…In dendrite cell algorithm (DCA), the abnormality of a data point is determined by comparing the multi-context antigen value (MCAV) with anomaly threshold. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20